Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks

Size: px
Start display at page:

Download "Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks"

Transcription

1 Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks Mahmuda Ahmed, Mehrab Shariar, Shobnom Zerin and Ashikur Rahman Department of Computer Science and Engineering Bangladesh University of Engineering and Technology Dhaka, Bangladesh Abstract We consider ad-hoc wireless networks and the topology control problem defined as minimizing the amount of power needed to maintain connectivity. The issue boils down to selecting the optimum transmission power level at each based on the position information of reachable s. Local decisions regarding the transmission power level induce a subgraph of the maximum powered graph G max in which edges represent direct reachability at maximum power. We propose an analysis for constructing minimum-energy path-preserving subgraphs of G max, i.e., ones minimizing the energy consumption between pairs. We also propose an algorithm for constructing subgraph of G max based on 1-hop neighbor information. By presenting experimental results we show the effectiveness of our proposed algorithm. keywords: Ad-hoc Network. I. INTRODUCTION Minimizing energy consumption is a major design goal in ad-hoc wireless network. If networks are designed preserving minimum energy paths then significant reduction in energy consumption can be achieved. We have to choose the minimum power level for each to minimize the energy consumption for the whole network. We use the same model as [1] which considers, an n-, multi-hop, ad-hoc, wireless network deployed on a two-dimensional plane. Suppose that each is capable of adjusting its transmission power up to a maximum denoted by P max. Such a network can be modeled as a graph G=(V,E), with the vertex set V representing the s, and the edge set defined as follows: E = { x, y x, y V V d(x, y) R max } (1) where d(x,y) is the distance between s x and y and R max is the maximum distance reachable by a transmission at the maximum power P max. The graph G defined this way is called the maximum powered network. By setting a reduced power level for each, messages can be transmitted with a minimum energy among all the paths in the network. This will lessen average degree and produce a subgraph of G, while maintaining global connectivity. We say that a graph G G is a minimum-energy pathpreserving graph or, alternatively, that it has the minimum energy property, if for any pair of s (u,v) that are connected in G, at least one of the (possibly multiple) minimum energy paths between u and v in G also belongs to G. Minimum-energy path-preserving graphs were first defined in [2]. Typically, many minimum-energy path-preserving graphs can be formed from the original graph G. It has been shown that the smallest of such subgraphs of G is the graph G min = (V,E min ),where(u, v) E min iff there is no path of length greater than 1 from u to v that costs less energy than the energy required for a direct transmission between u and v. Let G i = (V,E i ) be a subgraph of G = (V,E) such that (u, v) E i iff (u, v) E and there is no path of length i that requires less energy than the direct one-hop transmission between u and v. Then G min can be formally defined as follows: G min = G 2 G4... Gn 1 (2) It is easy to see that any subgraph G of G has the minimumenergy property iff G G min. Thereby, each of G i G min, for any i = 2, 3,..., n-1 is a minimum-energy path-preserving graph. G 2 is the first of the series G i, it is the most practically useful derivative of the maximum powered graph G. An algorithm for constructing one such graph, G 2, was presented in [2]. It works reasonably well in dense networks but its performance degrades considerably when the network density drops to medium or low. Construction of G 2 efficiently in sparse and moderately dense networks with some assistance of the Medium Access Control (MAC) layer was presented in [1]. To construct G 3 we need 2-hop information that means information from the immediate neighbors and the neighbors of those immediate neighbors. Number of links in G 2 and G 3 is considerably less compared to the number of links within the maximum powered network. Interestingly, number of links in G 3 does not reduce significantly compared to G 2 but G 3 requires 1 hop more information than G 2. On the other hand, if we can construct G 3 and G 2 in a distributed way, we can also construct G 2 G 3. G 2 G 3 is definitely more close to G min than G 2 and it has a great amount of savings in comparison to G 2. Construction of G 3 involves exchanging many messages, and thus causes obvious energy overheads. We have tried not to increase the overhead but improve the performance of G 2. Then we construct G 3 with the information collected from only the neighbors found within the region having radius R max. The resulting graph is Local Minimum Energy Communication Network () is nothing but G 2 with limited information. We present here a distributed algorithm to locally construct G 2. This approach requires no further

2 information than G 2 but produces a reasonable amount of savings. II. RELATED WORKS Recent research has lead to exposure of mainly three dimensions directed at power control algorithms for wireless mobile networks. The first class of solutions looks at the issue from the perspective of MAC layer. Monks et al. [3] propose a modification to the IEEE RTS-CTS handshake whereby a overhearing a CTS packet uses the received power to estimate its distance to the sender. Also, Sing et al. [4] propose techniques for powering-off the transceivers when they are not active. The significance of the second approach lies in its dealing with network layer. Most of the schemes in this class use distributed variants of the Bellman-Ford algorithm with various flavors of cost metrics derived from the notion of power. Metrics taken as standard are as follows: energy consumed per packet, time to network partition, variance in power levels, and(power) cost per packet. The findings in the second approach can play a leading role in the third approach that separates routing from topology control. Ramanathan [5] describe two centralized heuristic algorithms to minimize the maximum transmission power while trying to maintain connectivity or bi-connectivity, called Local Information No Topology (LINT) and Local Information Link-State Topology (LILT). COMPOW proposed by Narayanaswamy [6], chooses the smallest common power level for each emphasizing mainly on 1) connectivity, 2)traffic carrying capacity maximization, 3)contention reduction in MAC layer, and 4) low power requirement. It is pre-assumed that distribution of s are homogeneous, which in the long run may appear as a serious flaw. CLUSTERPOW was designed to overcome the shortcomings of COMPOW by introducing clusters. However, it still suffers from a significant message overhead. Cone-Based Topology Control (CBTC), generates a graph structure similar to the one proposed by Yao [7]. Suitable initial power level and the increment of power level at each step are the driving force of CBTC, and plays a pioneer role in determining the number of overhead messages. Rodoplu [8] introduce the notion of relay region based on a specific power model. Their algorithm was later modified by Li [2] to trim some unnecessary edges. Our work closely relates to these two studies. N. Li [9] propose a distributed topology control algorithm (called LMST) based on constructing minimum spanning trees. Their algorithm achieves three goals: 1) connectivity, 2) bounded degree ( 6) and 3) bi-directional links. In LMST, each u collects the position information of all neighbors reachable at the maximum power. Based on this information, u creates its own local minimum spanning tree among the set of neighbors, where the weight of an edge is the necessary transmission power between its two ends. Once the tree has been constructed, u contributes to the final topology those s that are its neighbors in the spanning tree. One problem with LMST is that the resulting graph does not preserve the minimum-energy paths. III. ALGORITHM A. Power Model We are using the same power model as [1]. Here we assume the well known, generic, two-way, channel path loss model, where the minimum transmission power is a function of distance [1]. To send a packet from x to y, separated by distance d(x,y), the minimum necessary transmission power is approximated by P trans (x, y) =t d α (x, y), (3) where α 2 isthepath loss factor and t is a constant. Signal reception is assumed to cost a fixed amount of power denoted by r. Thus, the total power required for one-hop transmission between x and y becomes P total (x, y) =t d α (x, y)+r, (4) The model assumes that each is aware of its own position with a reasonable accuracy, e.g., via a GPS device. B. Previous approach to constructing G 2 An algorithm was presented in [8] based on relay region. Theconceptislikethis: Given a u and another v within u s communication range (at P max ), the relay region of v as perceived by u (with respect to u), R u v, is the collection of points such that relaying through v to any point in R u v takes less energy than a direct transmission to that point (see 1)). Given Fig. 1. u (a) The relay region of v with respect to u (b) The enclosure of the definition of relay region, the algorithm for constructing G 2 becomes straightforward. Construction of G 2 efficiently in sparse and moderately dense networks with some assistance of the Medium Access Control (MAC) layer was presented in [1].

3 Algorithm: 1. /* s main */ 2. /* ℵ is the set of discovered so far */ 3. /* ℵ s Neighbor set of s*/ 4. /* Suppose, s got a reply from r*/ 5. begin 6. ℵ s = ℵ s r 7. for each n in ℵ{ 8. /*get list of common neighbors 9. between n and r*/ 1. D=getCommonNeighbor(n,r,ℵ) 11. /*get list of common neighbors 12. between s and r*/ 13. G=getCommonNeighbor(s,r,ℵ) 14. Segment 1: 15. if r is in ℵ s { 16. /* case 1(a): */ 17. /* check for two length path 18. between s and r relaying through n*/ 19. if (cost(s, r) cost(s, n)+cost(n, r)){ 2. ℵ s = ℵ s {r} 21. goto Segment } 23. /* case 1(b): */ 24. /* check for three length path between s 25. and r relaying n and d*/ 26. for each d in D{ 27. if (cost(s, r) cost(s, n) 28. +cost(n, d)+cost(d, r)){ 29. ℵ s = ℵ s {r} 3. goto Segment } 32. } 33. } C. Algorithm We propose an algorithm for constructing close approximation of G 2 G 3 with much less overhead which works in a distributed way. We shall refer to our algorithm as the Local Minimum Energy Communication Network algorithm or algorithm in short through this paper. In algorithm, function cost(x, y) takes two s x and y as parameters and calculates the cost of direct transmission between them according to the equation 4 assuming t, the predetection threshold equal to 1 7 mw, additional receive power, r = 2mW and path loss factor, α = 4. Function getcommonneighbor(x,y,ℵ) determines the common neighbor set of x and y having information of set of s ℵ. The operation of the above algorithm is described from the viewpoint of one s. Heres broadcasts a single neighbor discovery message (NDM) at the maximum power P max. While s collects the replies of its neighbors, it learns their identities and locations. It constructs set ℵ and ℵ s. Initially, all those sets are empty (s doesn t even know what neighbors there are). Here N is defined as the set of all s that s has 34. Segment 2: 35. if n is in ℵ s { 36. /* case 2(a): */ 37. /* check for two length path 38. between s and n relaying through r*/ 39. if (cost(s, n) cost(s, r)+cost(r, n)){ 4. ℵ s = ℵ s {n} 41. goto Segment } 43. /* case 2(b): */ 44. /* check for three length path between 45. s and n relaying r and d*/ 46. for each d in D{ 47. if (cost(s, n) 48. cost(s, r)+cost(r, d)+cost(d, n)){ 49. ℵ s = ℵ s {n} 5. goto Segment } 52. } 53. /* case 2(c): */ 54. /* check for three length path between s 55. and n relaying through g and r*/ 56. for each g in G{ 57. if (cost(s, n) cost(s, g) 58. +cost(g, r)+cost(r, n)){ 59. ℵ s = ℵ s {n} 6. goto Segment } 62. } 63. } 64. Segment 3: 65. continue 66. } 67. ℵ = ℵ r 68. End discovered so far and ℵ s is the set of its neighbors. Node s has to maintain direct link or direct communication with each in ℵ s, ℵ s ℵ. When s gets a reply from r it is added in the neighbor set ℵ s, then it considers 2 cases for each in ℵ. First it tries to find out a n in ℵ such that cost(s, r) >= cost(s, n)+cost(n, r), thenr is discarded from ℵ s because n can be used as a relay to transmit to r (see figure 2 case 1(a)). If cost(s, r) <cost(s, n)+cost(n, r) then there is no path of length two that can be used to transmit r with less energy than direct transmission between s and r. So,r will not be discarded from neighbor set ℵ s. Thus G 2 is forming here. Now a three length path that costs less energy than a direct transmission between s and r is searched on. If d is a common neighbor between n and r then cost(s, r) >= cost(s, n) + cost(n, d) + cost(d, r) condition is checked. If there is a that fulfils the above condition then r is discarded from ℵ s because there is path of length three which costs less than direct transmission (see Figure 3

4 Fig. 2. Case 1(a) Fig. 5. Case 2(b) Fig. 3. Case 1(b) case 1(b)). Now our algorithm search for the s that should be removed from neighbor set ℵ s after including r. First it discards all the s for which r can be used as relay in case of two length path (see figure 4). Thus G 2 is formed here. Then search for a d in common neighbor set of n and r and for a g in common neighbor set of s and r is done to find out a three length path that is less costly than direct transmission between s and n (see figure 5 and figure 6). This algorithm constructs G 2 in a proper way and then tries to construct G 3 from available (partial) information. As we know that construction of G 3 requires 2 hop information from neighbors which causes more messages to be exchanged and increases energy overheads. So we tried to improve performance of G 2 here. We constructed G 3 using Fig. 4. Case 2(a) Fig. 6. Case 2(c) the local information found by exchanging 1 hop information like G 2. We refer to the graph found by as G throughout this paper. D. Why G close to G 2 In this section we present scenario where local information from immediate neighbors are not enough to construct G 3. In Figure 7 the circle represents R max neighborhood of a. b and c is inside its neighbor region but d is outside of its sensing range. Suppose d is situated very close to R max i.e., near the boundary of a. As a has only local information in, it will see that there is no two or three length path that costs less than direct communication between a and b, therefore it maintains link ab. But in actual case it might happen that relaying through c and d may cost less than direct communication between a and b. So,acdb is the three length path that is considered in G 3 but not in. This is a case where produces more link than G 2. Lemma 1: G G 2. Proof: A link between two s u, v V is deleted in only when there is another minimum energy path of two or three length between the s, i.e. applies G 2 and locally G 3, thus, it does not destroy any minimum energy path having length two or three. Besides, produces some extra links as described in previous subsection. So the resultant graph G is definitely a superset of G 2.

5 7 6 original Fig. 7. An Extraneous Edge Lemma 2: preserves connectivity. Proof: We presented G min as, G min = G 2 G4... Gn 1 According to [2] G min is the smallest subgraph with the minimum energy property. G min has no redundant edges and also preserves connectivity. Thereby, each of G i G min,for any i = 2, 3,..., n-1 is a minimum-energy path preserving graph and also preserves connectivity. G 2 G 3 is a superset of G min according to Lemma 2 G G 2 G 3 and thus, preserves connectivity. A. Topological Analysis IV. EXPERIMENTAL RESULTS By simulation we evaluate the performance of our algorithm. Initially we deployed 25-3 s over a flat square area of 67m 67m according to uniform distribution. Figure 8 shows a typical deployment of 75 s, each having a maximum communication range of 25m. This is the starting graph G for our algorithm. The graph found by G 2 is figure 9 which shows a great amount of savings than original graph G. The next graph at figure 1 is found by G 3,thisalsohas a large amount of savings with respect to original graph G at figure 8. So, both G 2 and G 3 shows good results. Now the graph that is closer to G min than G 2 and also G 3 is G 2 G 3 is shown in figure 11. This graph has the least number of links among the graphs mentioned above. Figure 12 shows the graph we found by. Here the graph has just one more linkthanthatofg 2 G 3. This implies that the performance of is much closer to G 2 G 3 but incurs much less overhead than constructing G 3 (2 hop information) to calculate G 2 G 3. We perform more simulation on our algorithm deploying 25-1 s according to zipf distribution, figure 13 shows the starting graph G of our algorithm. It is a typical deployment of 75 s, each having a maximum communication range of 25m. The next two fig shows the graph found by G 2 (figure 14) and G 3 (figure 15) where both shows good savings. In uniform distribution G 2 G 3 (figure 16) and G (figure 17) both shows same no of links. We have got the same result here without increasing the overhead, it is definitely a good achievement. Fig. 8. Original Graph (uniform distribution) no. of s 75 7 G Fig. 9. G 2 (uniform distribution) no. of s Fig. 1. G 3 (uniform distribution) no. of s 75

6 7 6 G2Int 7 6 G Fig. 11. G 2 G 3 (uniform distribution) no. of s Fig. 14. G 2 (Zipf distribution) no. of s Fig. 12. G (uniform distribution) no. of s 75 Fig. 15. G 3 (Zipf distribution) no. of s original 7 6 G2Int Fig. 13. Original Graph (Zipf distribution) no. of s 75 Fig. 16. G 2 G 3 (Zipf distribution) no. of s 75

7 no. of links G Fig. 17. G (Zipf distribution) no. of s 75 Fig no. of s comparison between G 2 and G in Zipf distribution no. of links G no. of s TABLE I COMPARISON BETWEEN G 2 AND G IN UNIFORM DISTRIBUTION No of Edges Edges Nodes in G 2 in G Fig. 18. Comparison Between G 2 and G in Uniform distribution B. Comparison between G 2 and G Here we deployed 25-3 s over a flat square area of 67m 67m according to uniform distribution and simulate the network both for G 2 and. For illustration, Table I shows a comparison between the number of edges in G 2 and in. For a specific number of s there are five different scenarios. We have taken average number of edges or links for each set. We found here a saving of 4.85% without increasing overhead( see figure 18). Again, we simulate on a network of 25-1 s deployed over a flat square area of 67m 67m according to Zipf distribution. Table II shows a comparison between the number of edges in G 2 and in. Up to 6.18% of links is saved here (see figure 19). In both distribution the savings is quite satisfactory and considerably higher for denser networks. C. Overhead Analysis A s broadcasts NDM at first to know about its neighbors. In case of constructing G 2, the number of reply messages for any s is equal to NodeDegree(s). Nodedegree is defined as the number of neighbors it has within the region having radius R max. For constructing G 2 G 3, the number of reply messages is equal to, NodeDegree(s)+ n neighbor(s) NodeDegree(n). Now, we took the number of reply messages as overhead. To analysis on overhead cost by G 3 and G (or G 2 ) we simulate on networks of 25-3 s deployed over a flat square area of 67m 67m spread under uniform distribution ( 2) and 25-1 s deployed over a flat square area of 67m 67m according to Zipf distribution ( 21). For a specific number of s there are five different scenarios. We have taken average number of overhead messages for each set. We found that construction of G 3 causes huge amount of overhead with respect to G in both the cases. TABLE II COMPARISON BETWEEN G 2 AND G IN ZIPF DISTRIBUTION No of Edges Edges Nodes in G 2 in G

8 No. of overhead messages 3e+6 2.5e+6 2e+6 1.5e+6 1e+6 5 V. CONCLUSION The algorithm we have presented is a distributed algorithm that ensures minimum energy path preserving graphs in adhoc wireless networks. Our construction of is assisted by the rudimentary protocol of constructing G 2. Its need of information for an additional hop is served with no additional overhead and only through the previous information gained through G 2. Our studies assisted by some simulation results, have demonstrated the superiority and robustness of the new algorithm over the previous solutions for networks with moderate and low density of s No. of s Fig. 2. Overhead comparison between G 3 and G in Uniform distribution No. of overhead messages No. of s Fig. 21. Overhead comparison between G 3 and G in Zipf distribution TABLE III OVERHEAD COMPARISON BETWEEN G 3 AND G IN UNIFORM DISTRIBUTION No of Overhead msg. Overhead msg. Nodes in G in G REFERENCES [1] A. Rahman and P. Gburzynski, Mac-assisted topology control for ad-hoc wireless networks. International Journal of Communication Systems, vol. 19, no. 9, pp , 26. [2] L. Li and J. Halpern, Minimum energy mobile wireless networks revisited, Proc. IEEE International Conference on Communications (ICC), june, 21. [3] J. P. Monks, V. Bhargavan, and W. M. Hwu, A power controlled MAC protocol for wireless packet networks, in Proceedings of INFOCOM, 21, pp [4] S. Singh and C. Raghavendra, Power efficient MAC protocol for multihop radio networks, in Proceedings of PIMRC, 1998, pp [5] R. Ramanathan and R. Rosales-Hain, Topology control of multihop wireless networks using transmit power adjustment, in In Proc. of IEEE INFOCOM 2, Tel Aviv, Israel, March 2, pp [6] S. Narayanaswamy, V. Kawadia, R. S. Sreenivas, and P. R. Kumar, Power control in ad-hoc networks: Theory, architecture, algorithm and implementation of the COMPOW protocol, in Proceedings of the European Wireless Conference - Next Generation Wireless Networks: Technologies, Protocols, Services and Applications, Florence, Italy, February 22, pp [7] Y.-S. C. h. Sze-Yao Ni, Yu-Chee Tseng and J.-P. Sheu, The broadcast storm problem in a mobile ad hoc network, in Mobicom, [8] V. Rodoplu and T. Meng, Minimum energy mobile wireless networks, IEEE Journal of Selected Areas in Communications, vol. 17, pp , [9] N. Li, J. C. Hou, and L. Sha, Design and analysis of an MST-based topology control algorithm, in Proceedings of INFOCOM, 23. [1] T. Rappaport, Wireless communications: principles and practice, pp , TABLE IV OVERHEAD COMPARISON BETWEEN G 3 AND G IN ZIPF DISTRIBUTION No of Overhead msg. Overhead msg. Nodes in G in G

Analysis of Minimum-energy Path-preserving Graphs for Ad-hoc Wireless Networks

Analysis of Minimum-energy Path-preserving Graphs for Ad-hoc Wireless Networks Analysis of Minimum-energy Path-preserving Graphs for Ad-hoc Wireless Networks Ashikur Rahman Mahmuda Ahmed Shobnom Zerin Department of Computer Science and Engineering, Bangladesh University of Engineering

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir

More information

Recent advances in microelectromechanical

Recent advances in microelectromechanical COVER FEATURE Energy-Efficient Area Monitoring for Sensor Networks The nodes in sensor networks must self-organize to monitor the target area as long as possible. Optimizing energy consumption in area

More information

A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks

A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks Dajin Wang Department of Computer Science Montclair State University, Upper Montclair, NJ 07043, USA wang@pegasus.montclair.edu

More information

A Dynamically Configurable Topology Control for Hybrid Ad Hoc Networks with Internet Gateways

A Dynamically Configurable Topology Control for Hybrid Ad Hoc Networks with Internet Gateways ynamically onfigurable Topology ontrol for Hybrid d Hoc Networks with Internet ateways eun-hee ho and Young-ae Ko raduate School of Information & ommunication, jou University, Republic of Korea {khzho,

More information

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,

More information

Energy Optimal Routing Protocol for a Wireless Data Network

Energy Optimal Routing Protocol for a Wireless Data Network Energy Optimal Routing Protocol for a Wireless Data Network Easwar Vivek Colloborator(s): Venkatesh Ramaiyan, Srikrishna Bhashyam Department of Electrical Engineering, Indian Institute of Technology, Madras.

More information

A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network

A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network Parama Bhaumik 1, Somprokash Bandyopadhyay 2 1 Dept. of Information Technology, Jadavpur

More information

ssumathy@vit.ac.in upendra_mcs2@yahoo.com

ssumathy@vit.ac.in upendra_mcs2@yahoo.com S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,

More information

An Analysis of the Optimum Node Density for Ad hoc Mobile Networks

An Analysis of the Optimum Node Density for Ad hoc Mobile Networks An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith y, and Louise E. Moser y Department of Computer Science y Department of Electrical and Computer

More information

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,

More information

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements

More information

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-4 E-ISSN: 2347-2693 A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy

More information

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering

More information

EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL

EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India nadhachandra@gmail.com Abstract Energy efficient load balancing in a Wireless Sensor

More information

A Link-state QoS Routing Protocol for Ad Hoc Networks

A Link-state QoS Routing Protocol for Ad Hoc Networks A Link-state QoS Routing Protocol for Ad Hoc Networks Anelise Munaretto 1 Hakim Badis 2 Khaldoun Al Agha 2 Guy Pujolle 1 1 LIP6 Laboratory, University of Paris VI, 8, rue du Capitaine Scott, 75015, Paris,

More information

Routing Performance in the Presence of Unidirectional Links in Multihop Wireless Networks

Routing Performance in the Presence of Unidirectional Links in Multihop Wireless Networks Routing Performance in the Presence of Unidirectional Links in Multihop Wireless Networks Mahesh K. Marina Department of ECECS University of Cincinnati Cincinnati, OH 1- USA mmarina@ececs.uc.edu Samir

More information

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at

More information

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical

More information

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

New Distributed Algorithm for Connected Dominating Set in Wireless Ad Hoc Networks

New Distributed Algorithm for Connected Dominating Set in Wireless Ad Hoc Networks 0-7695-1435-9/0 $17.00 (c) 00 IEEE 1 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS-35 0) 0-7695-1435-9/0 $17.00 00 IEEE Proceedings of the 35th Hawaii International

More information

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem

More information

Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation

Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea

More information

An Extended AODV Protocol to Support Mobility in Hybrid Networks

An Extended AODV Protocol to Support Mobility in Hybrid Networks An Extended AODV Protocol to Support Mobility in Hybrid Networks Sèmiyou A. Adédjouma* Polytechnic School of Abomey-Calavi (EPAC) University of Abomey-Calavi (UAC) Cotonou, Benin *semiyou.adedjouma {at}

More information

{p t [D1t(p t ) + D2t(p t )]}. Proposition 1. With a dynamic centralized pricing mechanism, p cen

{p t [D1t(p t ) + D2t(p t )]}. Proposition 1. With a dynamic centralized pricing mechanism, p cen On Profitability and Efficiency of Wireless Mesh Networks Fang Fang, College of Business Administration, Cal State San Marcos, fangfang@csusm.edu; Lili Qiu, Department of Computer Science, The Univ of

More information

Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1

Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Gautam Chakrabarti Sandeep Kulkarni Department of Computer Science and Engineering Michigan State University Abstract To ensure uninterrupted

More information

Performance Evaluation of The Split Transmission in Multihop Wireless Networks

Performance Evaluation of The Split Transmission in Multihop Wireless Networks Performance Evaluation of The Split Transmission in Multihop Wireless Networks Wanqing Tu and Vic Grout Centre for Applied Internet Research, School of Computing and Communications Technology, Glyndwr

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network International Journal of Electronics Engineering, 3 (2), 2011, pp. 283 286 Serials Publications, ISSN : 0973-7383 Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network Gopindra

More information

Prediction of DDoS Attack Scheme

Prediction of DDoS Attack Scheme Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and

More information

Quality of Service Routing in Ad-Hoc Networks Using OLSR

Quality of Service Routing in Ad-Hoc Networks Using OLSR Quality of Service Routing in Ad-Hoc Networks Using OLSR Ying Ge Communications Research Centre ying.ge@crc.ca Thomas Kunz Carleton University tkunz@sce.carleton.ca Louise Lamont Communications Research

More information

Figure 1. The Example of ZigBee AODV Algorithm

Figure 1. The Example of ZigBee AODV Algorithm TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm

More information

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol

More information

Optimized Load Balancing Mechanism Using Carry Forward Distance

Optimized Load Balancing Mechanism Using Carry Forward Distance Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

Locating Randomly Selected Destinations in Large Multi-hop Wireless Networks

Locating Randomly Selected Destinations in Large Multi-hop Wireless Networks Locating Randomly Selected Destinations in Large Multi-hop Wireless Networks Jing Deng Department of Computer Science University of New Orleans New Orleans, LA 7148, USA E-mail: jing@cs.uno.edu Abstract.

More information

Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using Directional Antennas

Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using Directional Antennas I.J.Computer Network and Information Security, 21, 2, 26-32 Published Online December 21 in MECS (http://www.mecs-press.org/) Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using

More information

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,

More information

A Secure Key Management Scheme in Wireless Mesh Networks

A Secure Key Management Scheme in Wireless Mesh Networks A Secure Key Management Scheme in Wireless Mesh Networks Farah Kandah, Weiyi Zhang, Xiaojiang Du, Yashaswi Singh Department of Computer Science, North Dakota State University, Fargo, ND 585 Department

More information

QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data

QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data Md. Golam Shagadul Amin Talukder and Al-Mukaddim Khan Pathan* Department of Computer Science and Engineering, Metropolitan University, Sylhet,

More information

Load Balancing Routing Algorithm among Multiple Gateways in MANET with Internet Connectivity

Load Balancing Routing Algorithm among Multiple Gateways in MANET with Internet Connectivity Load Balancing Routing Algorithm among Multiple Gateways in MANET with Internet Connectivity Yonghang Yan*, Linlin Ci*, Ruiping Zhang**, Zhiming Wang* *School of Computer Science, Beiing Institute of Technology,

More information

Review of DDoS and Flooding Attacks in MANET

Review of DDoS and Flooding Attacks in MANET Review of DDoS and Flooding Attacks in MANET Mohan K Mali 1, Pramod A Jadhav 2 Dept. of Information Tchnology, Bharati Vidyapeeth Deemed University College of Engineering, Pune-43 Abstract-- The flooding

More information

A Hierarchical Structure based Coverage Repair in Wireless Sensor Networks

A Hierarchical Structure based Coverage Repair in Wireless Sensor Networks A Hierarchical Structure based Coverage Repair in Wireless Sensor Networks Jie Wu Computer Science & Engineering Department Florida Atlantic University Boca Raton, FL 3343, USA E-mail: jie@cse.fau.edu

More information

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.

More information

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of

More information

A Performance Comparison of Stability, Load-Balancing and Power-Aware Routing Protocols for Mobile Ad Hoc Networks

A Performance Comparison of Stability, Load-Balancing and Power-Aware Routing Protocols for Mobile Ad Hoc Networks A Performance Comparison of Stability, Load-Balancing and Power-Aware Routing Protocols for Mobile Ad Hoc Networks Natarajan Meghanathan 1 and Leslie C. Milton 2 1 Jackson State University, 1400 John Lynch

More information

ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) olume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com

More information

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols

More information

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM 152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented

More information

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks 1 Taifei Zhao, 2 Xizheng Ke, 3 Peilin Yang *1,Corresponding Author Department of Electronics Engineering, Xi an University of Technology,

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India

More information

Task-based Self-Organization in Large Smart Spaces: Issues and Challenges 1

Task-based Self-Organization in Large Smart Spaces: Issues and Challenges 1 Task-based Self-Organization in Large Smart Spaces: Issues and Challenges 1 P. Basu and T.D.C. Little Department of Electrical and Computer Engineering Boston University, Boston, Massachusetts 02215, USA

More information

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental

More information

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Kirill Krinkin Open Source and Linux lab Saint Petersburg, Russia kirill.krinkin@fruct.org Eugene Kalishenko Saint Petersburg

More information

An Energy Efficient Location Service for Mobile Ad Hoc Networks

An Energy Efficient Location Service for Mobile Ad Hoc Networks An Energ Efficient Location Service for Mobile Ad Hoc Networks Zijian Wang 1, Euphan Bulut 1 and Boleslaw K. Szmanski 1, 1 Department of Computer Science, Rensselaer Poltechnic Institute, Tro, NY 12180

More information

other. A B AP wired network

other. A B AP wired network 1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer

More information

The Monitoring of Ad Hoc Networks Based on Routing

The Monitoring of Ad Hoc Networks Based on Routing The Monitoring of Ad Hoc Networks Based on Routing Sana Ghannay, Sonia Mettali Gammar, Farouk Kamoun CRISTAL Laboratory ENSI, University of Manouba 21 Manouba - Tunisia {chnnysn,sonia.gammar}@ensi.rnu.tn,

More information

Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network

Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network International Journal of Future Generation Communication and Networking 67 Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network Jie Zhang, Choong Kyo Jeong, Goo Yeon Lee, Hwa Jong

More information

Energy Consumption analysis under Random Mobility Model

Energy Consumption analysis under Random Mobility Model DOI: 10.7763/IPEDR. 2012. V49. 24 Energy Consumption analysis under Random Mobility Model Tong Wang a,b, ChuanHe Huang a a School of Computer, Wuhan University Wuhan 430072, China b Department of Network

More information

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents

More information

IN THIS PAPER, we study the delay and capacity trade-offs

IN THIS PAPER, we study the delay and capacity trade-offs IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness

More information

Introduction to LAN/WAN. Network Layer

Introduction to LAN/WAN. Network Layer Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services

More information

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks 1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity

More information

Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network

Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network Sagar M Mane Walchand Institute of Technology Solapur. India. Solapur University, Solapur. S.S.Apte Walchand Institute

More information

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan

More information

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and

More information

Technology White Paper Capacity Constrained Smart Grid Design

Technology White Paper Capacity Constrained Smart Grid Design Capacity Constrained Smart Grid Design Smart Devices Smart Networks Smart Planning EDX Wireless Tel: +1-541-345-0019 I Fax: +1-541-345-8145 I info@edx.com I www.edx.com Mark Chapman and Greg Leon EDX Wireless

More information

Enhanced routing performance and overhead in Mobile Ad-hoc network for big data Transmission in Telemedicine using computer communication network

Enhanced routing performance and overhead in Mobile Ad-hoc network for big data Transmission in Telemedicine using computer communication network ISSN (Online) : 2278-1021 Enhanced routing performance and overhead in Mobile Ad-hoc network for big data Transmission in Telemedicine using computer communication network D. Rajasekaran 1, S.Saravanan

More information

Hosts Address Auto Configuration for Mobile Ad Hoc Networks

Hosts Address Auto Configuration for Mobile Ad Hoc Networks Hosts Address Auto Configuration for Mobile Ad Hoc Networks Sudath Indrasinghe, Rubem Pereira, Hala Mokhtar School of Computing and Mathematical Sciences Liverpool John Moores University M.P.Indrasinghe@2004.ljmu.ac.uk,

More information

Scaling 10Gb/s Clustering at Wire-Speed

Scaling 10Gb/s Clustering at Wire-Speed Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400

More information

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks 1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166

More information

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue

More information

Power Aware Routing in Ad Hoc Wireless Networks

Power Aware Routing in Ad Hoc Wireless Networks Power Aware Routing in Ad Hoc Wireless Networks Vinay Rishiwal 1, Mano Yadav 2, S. Verma 3, S. K. Bajapai 4 1 MJP Rohilkhand University, Bareilly,UP, India. 2 ITS Engineering College, Greater Noida, UP,

More information

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh

More information

WIRELESS communication channels have the characteristic

WIRELESS communication channels have the characteristic 512 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 54, NO. 3, MARCH 2009 Energy-Efficient Decentralized Cooperative Routing in Wireless Networks Ritesh Madan, Member, IEEE, Neelesh B. Mehta, Senior Member,

More information

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

An Implementation of Secure Wireless Network for Avoiding Black hole Attack An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,

More information

Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks

Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks Gowthami.A, Lavanya.R Abstract - A number of energy-aware routing protocols are proposed to provide the energy efficiency

More information

A Multi-Poller based Energy-Efficient Monitoring Scheme for Wireless Sensor Networks

A Multi-Poller based Energy-Efficient Monitoring Scheme for Wireless Sensor Networks A Multi-Poller based Energy-Efficient Monitoring Scheme for Wireless Sensor Networks Changlei Liu and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University E-mail:

More information

A Survey: High Speed TCP Variants in Wireless Networks

A Survey: High Speed TCP Variants in Wireless Networks ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Survey:

More information

Energy Aware Load Balancing in Secure Heterogeneous Wireless Sensor Network

Energy Aware Load Balancing in Secure Heterogeneous Wireless Sensor Network Energy Aware Load Balancing in Secure Heterogeneous Wireless Sensor Network Chandrakant N Bangalore, India nadhachandra@gmail.com Abstract A Wireless Sensor Network(WSN) is a energy and security constraint

More information

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering

More information

Securing MANET Using Diffie Hellman Digital Signature Scheme

Securing MANET Using Diffie Hellman Digital Signature Scheme Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2

More information

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,

More information

A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET

A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET S.Suganya Sr.Lecturer, Dept. of Computer Applications, TamilNadu College of Engineering, Coimbatore, India Dr.S.Palaniammal Prof.& Head,

More information

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

Load Balancing Routing in Multi-Channel Hybrid Wireless Networks with Single Network Interface

Load Balancing Routing in Multi-Channel Hybrid Wireless Networks with Single Network Interface Load Balancing Routing in Multi-Channel Hybrid Wireless Networks with Single Network Interface Jungmin So Nitin H. Vaidya Coordinated Science Laboratory, University of Illinois at Urbana-Champaign Email:

More information

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

Comparison of WCA with AODV and WCA with ACO using clustering algorithm Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks

More information

Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0

Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0 INTERNATIONAL JOURNAL OF ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY An international, online, open access, peer reviewed journal Volume 2 Issue 2 April 2013 Research Article ISSN 2277 9140 Copyright

More information

Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm

Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm Pallavi Motharkar 1, Dr.P.R.Deshmukh 2 and Prof.G.S.Thakare 3 1 M.E. (Computer Engineering), 2,3 Department

More information

Effective Link Operation Duration: a New Routing Metric for Mobile Ad Hoc Networks

Effective Link Operation Duration: a New Routing Metric for Mobile Ad Hoc Networks Effective Link Operation Duration: a New Routing Metric for Mobile Ad Hoc Networks Xiaoqin Chen, Haley M. Jones, A.D.S. Jayalath Department of Information Engineering, CECS Department of Engineering, CECS

More information

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks Jeongcheol Lee, Euisin

More information